{"id":1809,"date":"2019-09-02T08:25:01","date_gmt":"2019-09-02T07:25:01","guid":{"rendered":"https:\/\/www.calligo.io\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/"},"modified":"2023-05-01T19:30:22","modified_gmt":"2023-05-01T18:30:22","slug":"how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives","status":"publish","type":"post","link":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/","title":{"rendered":"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives"},"content":{"rendered":"\n<p>ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design.<\/p>\n\n\n\n<p>Within&nbsp;the press release and introduction released last month announcing the world\u2019s first international standard for information privacy management, the International Standards Organization (ISO) noted that: Privacy has become a \u201csignificant business concern\u201d Cybersecurity is \u201ca growing concern\u201d Costs of data breaches are rising Legal obligations are \u201cincreasingly stringent\u201d Protection of privacy is a \u201csocietal need\u201d The quantity and types of PII are increasing\u2026 \u2026as are the variety of circumstances where organizations need to co-operate with one another to process it And finally, many organizations are simply not ready and need guidance<\/p>\n\n\n\n<p>Quite a backdrop for a new, and clearly essential, \u2018Privacy Information Management System\u2019 (PIMS)!<\/p>\n\n\n\n<p>So what do you need to know about it?<\/p>\n\n\n\n<p>Most importantly, it supplements ISO 27001, the widely-adopted Information Security Management Standard. According to the ISO website, 27001 \u201cis a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process.\u201d<\/p>\n\n\n\n<p>This is absolutely the right way to think of any PIMS \u2013 as an extension to the well-understood and widely-applied practical thinking of an ISMS. The symbiotic link between data security and data privacy is well-documented and obvious. Take the GDPR for example, and how many references there are within it to \u201ctechnical and organisational measures.\u201d<\/p>\n\n\n\n<p>But still, making this theoretical link a reality \u2013 and going a long way towards achieving&nbsp;Privacy by Design&nbsp;in the process \u2013 remains complex. Not least because of the lack of a common language between Privacy pros and their IT and Security peers, as our&nbsp;Privacy Rosetta Stone&nbsp;project revealed.<\/p>\n\n\n\n<p>Achieving&nbsp;Privacy by Design&nbsp;should be any data-centric business\u2019 goal, and for that, Privacy and IT &amp; Security need to collaborate effectively. This requires clear and transparent communication, which is notoriously somewhat less than common between the two departments.<\/p>\n\n\n\n<p>But if these two departments cannot communicate between each other clearly, then there is zero chance of the importance, requirements and urgency of privacy being communicated across the wider organization.<\/p>\n\n\n\n<p>Thankfully, ISO 27701 helps bring the two parties together. It creates a common goal for data protection, using language that IT &amp; Security will understand (it is based on \u201ctheir\u201d 27001 after all), while enforcing the practices that Privacy demands.<\/p>\n\n\n\n<p>It does not totally fix the communication issue that is endemic between the two departments, but then it never intended to. It does however put Privacy into a practical IT &amp; Security context. It outlines practical steps, measures and requirements that stop IT &amp; Security thinking that privacy is not their territory, or worse, solved simply by securing the network.<\/p>\n\n\n\n<p>In essence, implementing ISO 27701 cuts to the chase. It helps you bypass the noise, frustration, misunderstanding and delay of typical Privacy-Security initiatives and help you take meaningful steps faster towards a privacy-centric culture.<\/p>\n\n\n\n<p>It can\u2019t solve the problem entirely. Privacy and IT &amp; Security still both need to work harder to improve the transparency and frequency of their communication, especially in more complex or innovative projects. But ISO 27701 lays strong foundations for effective collaboration and ongoing regulatory adherence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design<\/p>\n","protected":false},"author":33,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"post_format_type":[40],"class_list":["post-1809","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives | Calligo<\/title>\n<meta name=\"description\" content=\"ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives | Calligo\" \/>\n<meta property=\"og:description\" content=\"ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/\" \/>\n<meta property=\"og:site_name\" content=\"Calligo\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-02T07:25:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-01T18:30:22+00:00\" \/>\n<meta name=\"author\" content=\"Brendan Walsh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:site\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brendan Walsh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/\"},\"author\":{\"name\":\"Brendan Walsh\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f\"},\"headline\":\"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives\",\"datePublished\":\"2019-09-02T07:25:01+00:00\",\"dateModified\":\"2023-05-01T18:30:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/\"},\"wordCount\":541,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/\",\"url\":\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/\",\"name\":\"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives | Calligo\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/#website\"},\"datePublished\":\"2019-09-02T07:25:01+00:00\",\"dateModified\":\"2023-05-01T18:30:22+00:00\",\"description\":\"ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.calligo.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calligo.io\/#website\",\"url\":\"https:\/\/www.calligo.io\/\",\"name\":\"Calligo\",\"description\":\"Building value through data\",\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calligo.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calligo.io\/#organization\",\"name\":\"Calligo\",\"url\":\"https:\/\/www.calligo.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Calligo\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/calligocloud\",\"https:\/\/www.linkedin.com\/company\/calligo-limited\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f\",\"name\":\"Brendan Walsh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g\",\"caption\":\"Brendan Walsh\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives | Calligo","description":"ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/","og_locale":"en_GB","og_type":"article","og_title":"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives | Calligo","og_description":"ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design","og_url":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/","og_site_name":"Calligo","article_published_time":"2019-09-02T07:25:01+00:00","article_modified_time":"2023-05-01T18:30:22+00:00","author":"Brendan Walsh","twitter_card":"summary_large_image","twitter_creator":"@calligocloud","twitter_site":"@calligocloud","twitter_misc":{"Written by":"Brendan Walsh","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#article","isPartOf":{"@id":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/"},"author":{"name":"Brendan Walsh","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f"},"headline":"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives","datePublished":"2019-09-02T07:25:01+00:00","dateModified":"2023-05-01T18:30:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/"},"wordCount":541,"commentCount":0,"publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"articleSection":["Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/","url":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/","name":"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives | Calligo","isPartOf":{"@id":"https:\/\/www.calligo.io\/#website"},"datePublished":"2019-09-02T07:25:01+00:00","dateModified":"2023-05-01T18:30:22+00:00","description":"ISO 27701 arrives to guide privacy pros through the complexity of privacy implementation and Privacy by Design","breadcrumb":{"@id":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.calligo.io\/insights\/blog\/how-iso-27701-cuts-to-the-chase-of-privacy-security-initiatives\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.calligo.io\/"},{"@type":"ListItem","position":2,"name":"How ISO 27701 \u201ccuts to the chase\u201d of Privacy-Security initiatives"}]},{"@type":"WebSite","@id":"https:\/\/www.calligo.io\/#website","url":"https:\/\/www.calligo.io\/","name":"Calligo","description":"Building value through data","publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calligo.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.calligo.io\/#organization","name":"Calligo","url":"https:\/\/www.calligo.io\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","width":1200,"height":630,"caption":"Calligo"},"image":{"@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/calligocloud","https:\/\/www.linkedin.com\/company\/calligo-limited\/"]},{"@type":"Person","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f","name":"Brendan Walsh","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g","caption":"Brendan Walsh"}}]}},"_links":{"self":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/1809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/comments?post=1809"}],"version-history":[{"count":0,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/1809\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media?parent=1809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/categories?post=1809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/tags?post=1809"},{"taxonomy":"post_format_type","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/post_format_type?post=1809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}